CVE-2024-10025

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to read default passwords stored in plain text within .sdd files, enabling unauthorized access to SICK industrial control products as 'Authorized Clients'. Organizations using affected SICK products with unchanged default passwords are at risk.

💻 Affected Systems

Products:
  • SICK industrial control products using .sdd files
Versions: All versions prior to patched versions
Operating Systems: Embedded systems in SICK devices
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable if default passwords have not been changed by customers.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of industrial control systems leading to operational disruption, data theft, or safety incidents if attackers gain authorized client access.

🟠

Likely Case

Unauthorized access to industrial systems allowing configuration changes, data exfiltration, or disruption of industrial processes.

🟢

If Mitigated

Minimal impact if default passwords have been changed and proper network segmentation is implemented.

🌐 Internet-Facing: HIGH if devices are internet-facing, as attackers can remotely exploit the vulnerability.
🏢 Internal Only: MEDIUM for internal networks, requiring attacker presence on the network but still posing significant risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires access to .sdd files but is straightforward once obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific versions

Vendor Advisory: https://sick.com/psirt

Restart Required: Yes

Instructions:

1. Download latest firmware from SICK support portal. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Verify update completion and functionality.

🔧 Temporary Workarounds

Change Default Passwords

all

Immediately change all default passwords on affected SICK devices

Network Segmentation

all

Isolate SICK devices in separate network segments with strict access controls

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to SICK devices
  • Enable detailed logging and monitoring for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check if .sdd files contain plaintext default passwords and verify if default passwords are still in use

Check Version:

Check device web interface or console for firmware version information

Verify Fix Applied:

Verify firmware version matches patched version from vendor advisory and test that default passwords no longer work

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful login
  • Unauthorized configuration changes
  • Access from unexpected IP addresses

Network Indicators:

  • Unusual network traffic to/from SICK devices
  • Protocol anomalies in industrial communication

SIEM Query:

source="sick_device" AND (event_type="authentication" AND result="success" AND user="default")

🔗 References

📤 Share & Export